ADVANCED ENCRYPTION STANDARD USING FPGA OVERNETWORK
The increase number of eavesdropping or cracker to attack the information and hack the privacy of people. So, the essential issue is making system capable of ciphering information with rapid speed. Due to the advance in computer eavesdropping and cracker that made them to analysis the way of ciphering in rapid speed way. The development in the computer especially in the rapid processer in the last decade create the breaching of any system is a matter of time. Owing to most of breaching ways are based on analysis of system that requireы to be breached and to try brute force on that system to crack it. However, the lacking of influential processers that are capable of breaching system since earlier processors are limit to number of instructions. It can be done in second, which was not sufficient trying to break the system using brute force. In addition, the time required is far away from getting valuable messages in the time that needed. So, the research gives the focus on performing rapid system for ciphering the information rapidly and changing the ciphering every few milliseconds. The changing of ciphering in every millisecond helps system form preventing the eavesdropping and cracker from imposing brute force on the system and hacking the messages and images. The system that created is based on Advanced Encryption Standard (AES), which is it very best performing algorithm in ciphering and deciphering since it doesn’t need complex mathematical formula. The research is about designing system that capable of performing AES by using high processer designed on Field programmable gate Area (FPGA). The ciphering of AES using FPGA helps minimize the time required to cipher the information. Also, the research will focus on ciphering and deciphering of images by AES using FPGA
Ekert, A. K., Huttner, B., Palma, G. M., Peres, A. (1994). Eavesdropping on quantum-cryptographical systems. Physical Review A, 50 (2), 1047–1056. doi: https://doi.org/10.1103/physreva.50.1047
Omran, S. S., Al-Hillali, A. A. (2015). Quarter of Iris Region Recognition Using the RED Algorithm. 2015 17th UKSim-AMSS International Conference on Modelling and Simulation (UKSim). doi: https://doi.org/10.1109/uksim.2015.70
Babitha M.P., Babu, K. R. R. (2016). Secure cloud storage using AES encryption. 2016 International Conference on Automatic Control and Dynamic Optimization Techniques (ICACDOT). doi: https://doi.org/10.1109/icacdot.2016.7877709
Barriga, L., Blom, R., Gehrmann, C.,Naslund, M. (2000). Communications security in an all-IP world. Ericsson review, 2, 96–107.
Nishikawa, N., Amano, H., Iwai, K. (2017). Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. Lecture Notes in Computer Science, 273–287. doi: https://doi.org/10.1007/978-3-319-64701-2_20
Abdullah, A. M. (2017). Advanced encryption standard (AES) algorithm to encrypt and decrypt data. Cryptography and Network Security.
Maharjan, R., Shrestha, A. K., Basnet, R. (2019). Image Steganography: Protection of Digital Properties against Eavesdropping.arXiv.org. Available at: https://arxiv.org/abs/1909.04685
Peake, T. M. (2005). Eavesdropping in communication networks. Animal Communication Networks, 13–37. doi: https://doi.org/10.1017/cbo9780511610363.004
Alanazi, H.O., Zaidan, B.B., Zaidan, A.A., Jalab, H. A., Shabbir, M.,Al-Nabhani, Y. (2010). New Comparative Study Between DES, 3DES and AESwithin Nine Factors. Journal of Computing, 2(3), 152–157.
Stallings, W. (2011). Cryptography and Network Security Principles and Practice.Prentice Hall.
Ueno, R., Morioka, S., Homma, N., Aoki, T. (2016). A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths. Cryptographic Hardware and Embedded Systems – CHES 2016, 538–558. doi: https://doi.org/10.1007/978-3-662-53140-2_26
Banik, S., Bogdanov, A., Regazzoni, F. (2017). Compact circuits for combined AES encryption/decryption. Journal of Cryptographic Engineering, 9 (1), 69–83. doi: https://doi.org/10.1007/s13389-017-0176-3
Jumma, L. F.,Omran, S. S. (2018). Design Of Superscalar SHA-1 & SHA-2 MIPS Processor Using FPGA. Association of Arab Universities Journal of Engineering Sciences, 25(3), 88–99.
Omran, S. S., Al-Hilali, A. A. (2018). Comparative Study Between Different Rectangle Iris Templates. 2018 International Conference on Advanced Science and Engineering (ICOASE). doi: https://doi.org/10.1109/icoase.2018.8548913
Al-Hilali, A. A., Jumma, L. F., Amory, I. A. (2019). High-Quality Image Security Implementation Using 128-Bit Based on Advanced Encryption Standard algorithm. Journal of Southwest Jiaotong University, 54 (6). doi: https://doi.org/10.35741/issn.0258-27126.96.36.199
Çavuşoğlu, Ü., Kaçar, S., Zengin, A., Pehlivan, I. (2018). A novel hybrid encryption algorithm based on chaos and S-AES algorithm. Nonlinear Dynamics, 92 (4), 1745–1759. doi: https://doi.org/10.1007/s11071-018-4159-4
Messerges, T. S. (2001). Securing the AES Finalists Against Power Analysis Attacks. Fast Software Encryption, 150–164. doi: https://doi.org/10.1007/3-540-44706-7_11
Elsherif, S., Mostafa, G., Farrag, S., Alexan, W. (2019). Secure Message Embedding in 3D Images. 2019 International Conference on Innovative Trends in Computer Engineering (ITCE). doi: https://doi.org/10.1109/itce.2019.8646685
Al-Fedaghi, S., Alsulaimi, M. (2018). Privacy Thinging Applied to the Processing Cycle of Bank Cheques. 2018 3rd International Conference on System Reliability and Safety (ICSRS). doi: https://doi.org/10.1109/icsrs.2018.8688874
Zodpe, H., Sapkal, A. (2020). An efficient AES implementation using FPGA with enhanced security features. Journal of King Saud University - Engineering Sciences, 32 (2), 115–122. doi: https://doi.org/10.1016/j.jksues.2018.07.002
Copyright (c) 2021 Hind Ali Abdul Hasan, Safaa Maijd Mohammed, Noor Hayder Abdul Ameer
This work is licensed under a Creative Commons Attribution 4.0 International License.
Our journal abides by the Creative Commons CC BY copyright rights and permissions for open access journals.
Authors, who are published in this journal, agree to the following conditions:
1. The authors reserve the right to authorship of the work and pass the first publication right of this work to the journal under the terms of a Creative Commons CC BY, which allows others to freely distribute the published research with the obligatory reference to the authors of the original work and the first publication of the work in this journal.
2. The authors have the right to conclude separate supplement agreements that relate to non-exclusive work distribution in the form in which it has been published by the journal (for example, to upload the work to the online storage of the journal or publish it as part of a monograph), provided that the reference to the first publication of the work in this journal is included.